Alton Corp

  • Home
  • Our Team

21/10/2013

Adopting Standards for Private Security Companies: the countdown begins

Read Now
 
Picture
Does the Private Security Industry need a Standard to improve their security service performance and demonstrate good management practices? If you, like us, think that the security industry should become more professional then who or what organization would develop such a Standard and how far would its tentacles reach?

For the last several years ASIS International and ANSI (American National Standard Institute) have been debating this issue with subject matter experts from all over the world based on numerous difficulties and complaints in the private security industry related to costs, poor management, and human rights and freedom violations.

The result – ANSI / ASIS PSC.1-2012  “Management System for Quality of Private Security Operations – Requirements with Guidance” was developed and approved by the American National Standard. Our Senior Associate, Peter Stewart, has combed through the draft standard documents for your benefit.


Read More

Share

7/10/2013

International Airport Security Symposium

Read Now
 
CHI Security has been invited to participate in the international symposium on "Airport Security: Design, Governance, Performance, Financing and Policy" which will take place in Toronto in May 2014. Bringing together up to 50 top experts from government, corporate and academic spheres worldwide, the purpose of the symposium is to evaluate challenges and best practices in the current aviation security system.

Michael Berk, CHI Security's Director, has joined the Executive Advisory Board to assist with developing the symposium's agenda and will be presenting at the 'Layered Screening and Preemption in Airport Security' panel session. 

Share

8/7/2013

What is an Outcome-Based approach to security?

Read Now
 
In our practice, we often encounter situations when clients ask questions about measuring 'security value' or whether this or that security solution works. How does one evaluate the effectiveness and efficiency of security operations? How does one determine which solutions to choose from? 

In our answers, or when we design and implement security solutions, we base our approach  on the Outcome-Based model -- almost everything can be supported by data or evidence if you know what questions to ask and how to engineer performance measurements.

In a rapidly changing operational environment when new threats emerge on a regular basis, the existing prescriptive models can no longer provide the expected security answers. In an outcome-based approach to security, while the established objectives remain the same a security program has enough flexibility and adaptability to deal with most of emerging challenges.
  
CHI Security Senior Associate, Peter Stewart, has prepared a short overview of what an Outcome-Based Approach is all about (see pdf below). Feel free to contact us if you have more questions.


outcome-based_security_chisecurity.pdf
File Size: 51 kb
File Type: pdf
Download File

Share

1/7/2013

Human Eye vs Technology in security: who wins?

Read Now
 
This philosophical question continues to occupy the minds of many security professionals and interested commentators. The answer, in most cases, is somewhere in the middle but this team believes that in a truly proactive security system Human Factor should-be the determining element.

While there are many security threats and risks outside, the reality is that we mostly fear those coming from other humans. In simple terms, this inherent mistrust in other humans, whether as risk factors or performers, is what causes us to look for technology as a solution. The problem of course is that humans in general (and evil-doers in particular) are quite inventive in circumventing various static barriers put in their way, be it a sensor-wired wall, a sophisticated X-ray machine or biometric devices (not to mention another apparent problem -- these 'solutions' have humans attached to operate them, oops). In reality, most security systems we witness today are passive and inefficient. They perform 'law enforcement' duties (e.g. CCTVs -- a post-event information collection), are not flexible to deal with evolving threats and in many cases contribute to the 'security theatre' perception.

Read More

Share

24/6/2013

Measuring Security Value

Read Now
 
One of the biggest challenges facing any organization with a security department is: How to Explain (read: Justify) Utility of Security Operations? What Value do these operations bring to the overall bottom line? 

While senior managers, board members and general public accept the notional need for having security procedures and personnel in place since 9/11, most of those who run these operations have difficulty with providing answers beyond the mere "That's just it, we need it!" The situation is prevalent in many countries, but in Canada it is compounded by a simple fact that we have not (thankfully) experienced serious security incidents. Bad things just do not happen here.

Read More

Share

Details

    Author

    CHI Security team includes professionals with diverse backgrounds and experiences.  In this blog we share our musings on how to build a resilient security force. Hardware comes later... 

    Archives

    December 2013
    October 2013
    September 2013
    August 2013
    July 2013
    June 2013

    Categories

    All
    Behavior Detection
    Behaviour Profiling
    Body Language
    Human Factors
    Iata
    Icao
    Intent
    Performance Measurement
    Preparedness
    Proactive Security
    Quality Assurance
    Resilience
    Risk Assessment
    Security Operations
    Security Value
    Technology
    Threat & Risk Assessment
    Training
    Transportation
    Tsa

    RSS Feed

Powered by Create your own unique website with customizable templates.
  • Home
  • Our Team